Chapter 9 Configuring Switch-Based Authentication

Controlling Switch Access with TACACS+

Figure 9-1 Typical TACACS+ Network Configuration

UNIX workstation

(TACACS+

server 1)

171.20.10.7

UNIX workstation

(TACACS+

server 2)

171.20.10.8

Workstations

Catalyst 6500 series switch

Configure the switches with the TACACS+ server addresses.

Set an authentication key

(also configure the same key on the TACACS+ servers).

Enable AAA.

Create a login authentication method list. Apply the list to the terminal lines. Create an authorization and accounting

method list as required.

101230

Workstations

TACACS+, administered through the AAA security services, can provide these services:

Authentication—Provides complete control of authentication through login and password dialog, challenge and response, and messaging support.

The authentication facility can conduct a dialog with the user (for example, after a username and password are provided, to challenge a user with several questions, such as home address, mother’s maiden name, service type, and social security number). The TACACS+ authentication service can also send messages to user screens. For example, a message could notify users that their passwords must be changed because of the company’s password aging policy.

Authorization—Provides fine-grained control over user capabilities for the duration of the user’s session, including but not limited to setting autocommands, access control, session duration, or protocol support. You can also enforce restrictions on what commands a user can execute with the TACACS+ authorization feature.

Accounting—Collects and sends information used for billing, auditing, and reporting to the TACACS+ daemon. Network managers can use the accounting facility to track user activity for a security audit or to provide information for user billing. Accounting records include user identities, start and stop times, executed commands (such as PPP), number of packets, and number of bytes.

The TACACS+ protocol provides authentication between the switch and the TACACS+ daemon, and it ensures confidentiality because all protocol exchanges between the switch and the TACACS+ daemon are encrypted.

You need a system running the TACACS+ daemon software to use TACACS+ on your switch.

Catalyst 3750-E and 3560-E Switch Software Configuration Guide

 

OL-9775-02

9-11

 

 

 

Page 213
Image 213
Cisco Systems 3750E manual Typical TACACS+ Network Configuration